no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Adversarial attacks against dynamic graph neural networks via node injection
|
Jiang, Yanan |
|
|
4 |
1 |
p. |
article |
2 |
Adversarial robustness analysis of LiDAR-included models in autonomous driving
|
Yang, Bo |
|
|
4 |
1 |
p. |
article |
3 |
A self-driving solution for resource-constrained autonomous vehicles in parked areas
|
Qian, Jin |
|
|
4 |
1 |
p. |
article |
4 |
A survey for light field super-resolution
|
Zhao, Mingyuan |
|
|
4 |
1 |
p. |
article |
5 |
Cooperative multi-agent game based on reinforcement learning
|
Liu, Hongbo |
|
|
4 |
1 |
p. |
article |
6 |
Decoupled knowledge distillation method based on meta-learning
|
Du, Wenqing |
|
|
4 |
1 |
p. |
article |
7 |
Light field depth estimation: A comprehensive survey from principles to future
|
Wang, Tun |
|
|
4 |
1 |
p. |
article |
8 |
Neural-based inexact graph de-anonymization
|
Lu, Guangxi |
|
|
4 |
1 |
p. |
article |
9 |
Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications
|
Ananthi, J. Vijitha |
|
|
4 |
1 |
p. |
article |
10 |
Privacy-preserving human activity sensing: A survey
|
Yang, Yanni |
|
|
4 |
1 |
p. |
article |
11 |
Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption
|
Dong, Yueyan |
|
|
4 |
1 |
p. |
article |
12 |
Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
|
Feng, Xuecai |
|
|
4 |
1 |
p. |
article |
13 |
SoK: Privacy-preserving smart contract
|
Qi, Huayi |
|
|
4 |
1 |
p. |
article |